pentesting 0.7.0 → 0.7.1
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/index.js +49 -49
- package/package.json +1 -1
package/dist/index.js
CHANGED
|
@@ -1372,27 +1372,27 @@ async function executeToolCall(toolName, input) {
|
|
|
1372
1372
|
let result;
|
|
1373
1373
|
switch (toolName) {
|
|
1374
1374
|
// system tool
|
|
1375
|
-
case
|
|
1375
|
+
case TOOL_NAME.BASH:
|
|
1376
1376
|
result = await executeBash(input.command, {
|
|
1377
1377
|
timeout: input.timeout || 6e4,
|
|
1378
1378
|
background: input.background
|
|
1379
1379
|
});
|
|
1380
1380
|
break;
|
|
1381
|
-
case
|
|
1381
|
+
case TOOL_NAME.READ_FILE:
|
|
1382
1382
|
result = await readFile2(
|
|
1383
1383
|
input.path,
|
|
1384
1384
|
input.start_line,
|
|
1385
1385
|
input.end_line
|
|
1386
1386
|
);
|
|
1387
1387
|
break;
|
|
1388
|
-
case
|
|
1388
|
+
case TOOL_NAME.WRITE_FILE:
|
|
1389
1389
|
result = await writeFile2(
|
|
1390
1390
|
input.path,
|
|
1391
1391
|
input.content,
|
|
1392
1392
|
input.overwrite
|
|
1393
1393
|
);
|
|
1394
1394
|
break;
|
|
1395
|
-
case
|
|
1395
|
+
case TOOL_NAME.LIST_DIRECTORY:
|
|
1396
1396
|
result = await listDirectory(
|
|
1397
1397
|
input.path,
|
|
1398
1398
|
input.recursive,
|
|
@@ -1400,147 +1400,147 @@ async function executeToolCall(toolName, input) {
|
|
|
1400
1400
|
);
|
|
1401
1401
|
break;
|
|
1402
1402
|
// network scanning
|
|
1403
|
-
case
|
|
1403
|
+
case TOOL_NAME.RUSTSCAN:
|
|
1404
1404
|
result = await executeRustscan(input);
|
|
1405
1405
|
break;
|
|
1406
|
-
case
|
|
1406
|
+
case TOOL_NAME.NMAP_SCAN:
|
|
1407
1407
|
result = await executeNmapScan(input);
|
|
1408
1408
|
break;
|
|
1409
|
-
case
|
|
1409
|
+
case TOOL_NAME.TCPDUMP_CAPTURE:
|
|
1410
1410
|
result = await executeTcpdump(input);
|
|
1411
1411
|
break;
|
|
1412
1412
|
// Web Tools
|
|
1413
|
-
case
|
|
1413
|
+
case TOOL_NAME.WEB_REQUEST:
|
|
1414
1414
|
result = await executeWebRequest(input);
|
|
1415
1415
|
break;
|
|
1416
|
-
case
|
|
1416
|
+
case TOOL_NAME.DIRECTORY_BRUTEFORCE:
|
|
1417
1417
|
result = await executeDirBruteforce(input);
|
|
1418
1418
|
break;
|
|
1419
|
-
case
|
|
1419
|
+
case TOOL_NAME.SQL_INJECTION:
|
|
1420
1420
|
result = await executeSqlmap(input);
|
|
1421
1421
|
break;
|
|
1422
|
-
case
|
|
1422
|
+
case TOOL_NAME.BROWSER_AUTOMATION:
|
|
1423
1423
|
result = await executeBrowserAutomation(input);
|
|
1424
1424
|
break;
|
|
1425
1425
|
// Exploitation Tools
|
|
1426
|
-
case
|
|
1426
|
+
case TOOL_NAME.SEARCHSPLOIT:
|
|
1427
1427
|
result = await executeSearchsploit(input);
|
|
1428
1428
|
break;
|
|
1429
|
-
case
|
|
1429
|
+
case TOOL_NAME.METASPLOIT:
|
|
1430
1430
|
result = await executeMetasploit(input);
|
|
1431
1431
|
break;
|
|
1432
|
-
case
|
|
1432
|
+
case TOOL_NAME.GENERATE_PAYLOAD:
|
|
1433
1433
|
result = await generatePayload(input);
|
|
1434
1434
|
break;
|
|
1435
1435
|
// Credential Tools
|
|
1436
|
-
case
|
|
1436
|
+
case TOOL_NAME.BRUTEFORCE_LOGIN:
|
|
1437
1437
|
result = await executeBruteforce(input);
|
|
1438
1438
|
break;
|
|
1439
|
-
case
|
|
1439
|
+
case TOOL_NAME.CRACK_HASH:
|
|
1440
1440
|
result = await executeCrackHash(input);
|
|
1441
1441
|
break;
|
|
1442
1442
|
// permission escalation
|
|
1443
|
-
case
|
|
1443
|
+
case TOOL_NAME.RUN_PRIVESC_ENUM:
|
|
1444
1444
|
result = await executePrivescEnum(input);
|
|
1445
1445
|
break;
|
|
1446
|
-
case
|
|
1446
|
+
case TOOL_NAME.CHECK_SUDO:
|
|
1447
1447
|
result = await checkSudo(input);
|
|
1448
1448
|
break;
|
|
1449
|
-
case
|
|
1449
|
+
case TOOL_NAME.FIND_SUID:
|
|
1450
1450
|
result = await findSuid(input);
|
|
1451
1451
|
break;
|
|
1452
1452
|
// Post-Exploitation
|
|
1453
|
-
case
|
|
1453
|
+
case TOOL_NAME.SETUP_TUNNEL:
|
|
1454
1454
|
result = await setupTunnel(input);
|
|
1455
1455
|
break;
|
|
1456
|
-
case
|
|
1456
|
+
case TOOL_NAME.DUMP_CREDENTIALS:
|
|
1457
1457
|
result = await dumpCredentials(input);
|
|
1458
1458
|
break;
|
|
1459
|
-
case
|
|
1459
|
+
case TOOL_NAME.LATERAL_MOVEMENT:
|
|
1460
1460
|
result = await executeLateralMovement(input);
|
|
1461
1461
|
break;
|
|
1462
1462
|
// Windows / SMB / AD Tools
|
|
1463
|
-
case
|
|
1463
|
+
case TOOL_NAME.NETCAT:
|
|
1464
1464
|
result = await executeNetcat(input);
|
|
1465
1465
|
break;
|
|
1466
|
-
case
|
|
1466
|
+
case TOOL_NAME.SMB_ENUM:
|
|
1467
1467
|
result = await executeSmbEnum(input);
|
|
1468
1468
|
break;
|
|
1469
|
-
case
|
|
1469
|
+
case TOOL_NAME.ENUM4LINUX:
|
|
1470
1470
|
result = await executeEnum4linux(input);
|
|
1471
1471
|
break;
|
|
1472
|
-
case
|
|
1472
|
+
case TOOL_NAME.CRACKMAPEXEC:
|
|
1473
1473
|
result = await executeCrackmapexec(input);
|
|
1474
1474
|
break;
|
|
1475
|
-
case
|
|
1475
|
+
case TOOL_NAME.SMBCLIENT:
|
|
1476
1476
|
result = await executeSmbclient(input);
|
|
1477
1477
|
break;
|
|
1478
|
-
case
|
|
1478
|
+
case TOOL_NAME.RPCCLIENT:
|
|
1479
1479
|
result = await executeRpcclient(input);
|
|
1480
1480
|
break;
|
|
1481
|
-
case
|
|
1481
|
+
case TOOL_NAME.WINRM:
|
|
1482
1482
|
result = await executeWinrm(input);
|
|
1483
1483
|
break;
|
|
1484
|
-
case
|
|
1484
|
+
case TOOL_NAME.RDP_CHECK:
|
|
1485
1485
|
result = await executeRdpCheck(input);
|
|
1486
1486
|
break;
|
|
1487
|
-
case
|
|
1487
|
+
case TOOL_NAME.LDAP_SEARCH:
|
|
1488
1488
|
result = await executeLdapSearch(input);
|
|
1489
1489
|
break;
|
|
1490
|
-
case
|
|
1490
|
+
case TOOL_NAME.KERBRUTE:
|
|
1491
1491
|
result = await executeKerbrute(input);
|
|
1492
1492
|
break;
|
|
1493
|
-
case
|
|
1493
|
+
case TOOL_NAME.BLOODHOUND:
|
|
1494
1494
|
result = await executeBloodhound(input);
|
|
1495
1495
|
break;
|
|
1496
|
-
case
|
|
1496
|
+
case TOOL_NAME.MSSQL_CLIENT:
|
|
1497
1497
|
result = await executeMssqlClient(input);
|
|
1498
1498
|
break;
|
|
1499
|
-
case
|
|
1499
|
+
case TOOL_NAME.MYSQL_CLIENT:
|
|
1500
1500
|
result = await executeMysqlClient(input);
|
|
1501
1501
|
break;
|
|
1502
|
-
case
|
|
1502
|
+
case TOOL_NAME.REVERSE_SHELL:
|
|
1503
1503
|
result = await executeReverseShell(input);
|
|
1504
1504
|
break;
|
|
1505
1505
|
// Service Enumeration Tools
|
|
1506
|
-
case
|
|
1506
|
+
case TOOL_NAME.ZONE_TRANSFER:
|
|
1507
1507
|
result = await executeZoneTransfer(input);
|
|
1508
1508
|
break;
|
|
1509
|
-
case
|
|
1509
|
+
case TOOL_NAME.SNMP_WALK:
|
|
1510
1510
|
result = await executeSnmpWalk(input);
|
|
1511
1511
|
break;
|
|
1512
|
-
case
|
|
1512
|
+
case TOOL_NAME.SNMP_CHECK:
|
|
1513
1513
|
result = await executeSnmpCheck(input);
|
|
1514
1514
|
break;
|
|
1515
|
-
case
|
|
1515
|
+
case TOOL_NAME.ONESIXTYONE:
|
|
1516
1516
|
result = await executeOnesixtyone(input);
|
|
1517
1517
|
break;
|
|
1518
|
-
case
|
|
1518
|
+
case TOOL_NAME.FTP_ENUM:
|
|
1519
1519
|
result = await executeFtpEnum(input);
|
|
1520
1520
|
break;
|
|
1521
|
-
case
|
|
1521
|
+
case TOOL_NAME.FTP_ANON:
|
|
1522
1522
|
result = await executeFtpAnon(input);
|
|
1523
1523
|
break;
|
|
1524
|
-
case
|
|
1524
|
+
case TOOL_NAME.NBTSCAN:
|
|
1525
1525
|
result = await executeNbtscan(input);
|
|
1526
1526
|
break;
|
|
1527
|
-
case
|
|
1527
|
+
case TOOL_NAME.RPC_INFO:
|
|
1528
1528
|
result = await executeRpcInfo(input);
|
|
1529
1529
|
break;
|
|
1530
|
-
case
|
|
1530
|
+
case TOOL_NAME.SHOWMOUNT:
|
|
1531
1531
|
result = await executeShowmount(input);
|
|
1532
1532
|
break;
|
|
1533
|
-
case
|
|
1533
|
+
case TOOL_NAME.TELNET:
|
|
1534
1534
|
result = await executeTelnet(input);
|
|
1535
1535
|
break;
|
|
1536
|
-
case
|
|
1536
|
+
case TOOL_NAME.HYDRA:
|
|
1537
1537
|
result = await executeHydra(input);
|
|
1538
1538
|
break;
|
|
1539
1539
|
// report
|
|
1540
|
-
case
|
|
1540
|
+
case TOOL_NAME.REPORT_FINDING:
|
|
1541
1541
|
result = await reportFinding(input);
|
|
1542
1542
|
break;
|
|
1543
|
-
case
|
|
1543
|
+
case TOOL_NAME.TAKE_SCREENSHOT:
|
|
1544
1544
|
result = await takeScreenshot(input);
|
|
1545
1545
|
break;
|
|
1546
1546
|
default:
|